Advertisement

Neuro-Immune-Endocrine (NIE) Models for Emergency Services Interoperatibility

  • Zenon Chaczko
  • Perez Moses
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4739)

Abstract

Highly dynamic, re-configurable hardware, embedded software and communication networks are becoming very significant in operation of various emergency services. The key challenge in designing such systems is to provide a framework for interoperability of emergency services in disaster situations. The goal of the paper is to provide an insight into modelling techniques for studying emergency services interoperability functions in system design to avoid hidden points of failures. Concepts of artificial Neuro-Immune-Endocrine (NIE) homeostatic models [21][22][24] for autonomous self-configuring and self-healing systems are discussed. The paper features examples of collaborative software agents’ behaviour in hostile environments, cooperating protocols, smart embedded devices and pro-active infrastructures in various areas related to emergency services operations.

Keywords

Wireless Sensor Network Emergency Service Intrusion Detection System 14th Annual IEEE Biological Analogy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aickelin, U., Cayzer, S.: The Danger Theory and Its Application to Artificial Immune Systems, Technical Report Information Infrastructure Laboratory, HP Laboratories Bristol, HPL-2002-244 4th of (September, 2002) (Accessed May 2006), http://www.hpl.hp.com/techreports/2002/HPL-2002-244.pdf
  2. 2.
    Chaczko, Z., Klempous, R., Nikodem, J., Nikodem, M.: Methods of Sensors Localization in Wireless Sensor Networks. In: ECBS 2007. 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, Tucson, pp. 145–152 (2007)Google Scholar
  3. 3.
  4. 4.
    Cougaar Accessed (December 2006), http://www.cougaar.org
  5. 5.
    Definition of Agent Accessed (December 2006), http://www.ryerson.ca/dgrimsha/courses/cps720/agentDef.html
  6. 6.
    Gong, L.: Project JXTA: A Technology Overview (October 2002)Google Scholar
  7. 7.
    Helsinger, A., Thome, M., Wright, T.: Cougaar, A.: Cougaar: A Scalable, Distributed ulti-Agent Architecture. In: IEEE International Conference on Systems, Man, and Cybernetics, The Hague, Netherlands, vol. 2, pp. 1910–1917 (2004)Google Scholar
  8. 8.
    Itao, T., Tanaka, S., Suda, T., Aoyama, T.: A Framework for Adaptive UbiComp Applications Based on the Jack-In-The-Net Architecture. ACM Wireless Network J. 10(3), 287–299 (2004)CrossRefGoogle Scholar
  9. 9.
    Jablonski, A., Klempous, R., Licznerski, B.: Diversified Approach to Methdology and Technology in Distributed Intelligent Building Systems. In: Moreno-Díaz Jr., R., Pichler, F. (eds.) EUROCAST 2003. LNCS, vol. 2809, pp. 174–184. Springer, Heidelberg (2003)Google Scholar
  10. 10.
  11. 11.
    Klempous, R., Nikodem, J., Radosz, L., Raus, N.: Adaptive Misbehavior Detection in Wireless Sensors Network Based on Local Community Agreement. In: ECBS 2007. 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, Tucson, pp. 153–160 (2007)Google Scholar
  12. 12.
    Kulbacki, M., Jablonski, B., Klempous, R., Segen, J.: Learning from Examples and Comparing Models of Human Motion. JACIII 8(5), 477–481 (2004)Google Scholar
  13. 13.
    Lam, J.T.Q.: Biological Immune System Inspired Computer Network Security System Theoretical Framework: Comparative Study of Immune System, Capstone Report, UTS, Sydney (21 November, 2006)Google Scholar
  14. 14.
    Ng, C., Alibhai, Z., Sabaz, D., Uncu, O., Gruver, W.A.: Framework for Developing Distributed Systems in a Peer-to-Peer Environment. In: IEEE International Conference on Systems, Man, and Cybernetics, Taipei, Taiwan (2006)Google Scholar
  15. 15.
    Ng, C.: Framework for Developing Distributed Systems in a Peer-to-Peer Environment, M.ASc. thesis defence presentation v.7 Simon Fraser University, Vancouver, Canada (December 2006)Google Scholar
  16. 16.
    Ovcharenko, S., Alibhai, Z., Ng, C., Sabaz, D., Gruver, W.A.: Implementation of a Wireless Distributed Intelligent System. In: IEEE Workshop on Distributed Intelligent Systems: Collective Intelligence and Its Applications, Prague, Czech Republic (2006)Google Scholar
  17. 17.
    Ostaszewski, M., Seredynski, F., Bouvry, P.: Immune Anomaly Detection Enhanced with Evolutionary Paradigms. Published in the proceedings of the conference on Genetic and evolutionary computation (GECCO) (July 8-12, 2006)Google Scholar
  18. 18.
    Sabaz, D., Gruver, W.A.: Distributed Intelligent Systems: What Makes Them ‘Intelligent’. In: IEEE Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications Proceedings, Beijing, China (2005)Google Scholar
  19. 19.
    Sabaz, D.: The Slow Death of Centralization: The Ascension of a Distributed World, Simon Fraser University’s IRMACS Presentation, Vancouver, Canada (2006)Google Scholar
  20. 20.
    Snyder, R., Tomlinson, R.T.: Robustness Infrastructure for Multi-Agent Systems. In: Proceedings of the Open Cougaar, New York, U.S.A (2004)Google Scholar
  21. 21.
    Traversat, B., et al.: Project JXTA 2.0 Super-Peer Virtual Network (May 2003)Google Scholar
  22. 22.
    Vargas, P., Moioli, R., de Castro, L.: Artificial Homeostatic System: A Novel Approach. In: Capcarrère, M.S., Freitas, A.A., Bentley, P.J., Johnson, C.G., Timmis, J. (eds.) ECAL 2005. LNCS (LNAI), vol. 3630, pp. 754–764. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  23. 23.
    Watkins, A., Timmis, J., Boggess, L.: Artificial Immune Recognition System (AIRS): An Immune-Inspired Supervised Machine Learning Algorithm. Genetic Programming and Evolvable Machines Journal 5(3), 291–317 (2004)CrossRefGoogle Scholar
  24. 24.
    Wierzchon, S.T.: Deriving concise description of non-self patterns in an artificial immune system. In: Jain, L.C., Kacprzyk, J. (eds.) New Learning Paradigm in Soft Computing, pp. 438–458. Physica-Verlag (2001)Google Scholar
  25. 25.
    Wu, Z., Dong, H., Liang, Y., McKay, R.I.: A Chromosome-based Evaluation Model for Computer Defense Immune Systems. In: Proceedings of the IEEE Congress on Evolutionary Computation, Canberra, Australia, pp. 1363–1369 (December 8-12, 2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Zenon Chaczko
    • 1
  • Perez Moses
    • 2
  1. 1.Faculty of Engineering, University of Technology Sydney, Broadway, NSW 2007Australia
  2. 2.ZInd, 16 Gregory Terrace Lapstone, 2773Australia

Personalised recommendations